-
1
-
-
78049530550
-
The security of machine learning
-
Barreno, M., Nelson, B., Joseph, A., Tygar, J.: The security of machine learning. Machine Learning 81, 121-148 (2010)
-
(2010)
Machine Learning
, vol.81
, pp. 121-148
-
-
Barreno, M.1
Nelson, B.2
Joseph, A.3
Tygar, J.4
-
2
-
-
33845989821
-
Can machine learning be secure?
-
Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: Proc. 2006 ACM Symp. Information, Computer and Comm. Sec. (ASIACCS 2006), NY, USA pp. 16-25 (2006)
-
(2006)
Proc. 2006 ACM Symp. Information, Computer and Comm. Sec. (ASIACCS 2006), NY, USA
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
3
-
-
0030211964
-
Bagging predictors
-
Breiman, L.: Bagging predictors. Machine Learning 24(2), 123-140 (1996)
-
(1996)
Machine Learning
, vol.24
, Issue.2
, pp. 123-140
-
-
Breiman, L.1
-
4
-
-
38149123929
-
Advanced allergy attacks: Does a corpus really help?
-
Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. Springer, Heidelberg
-
Chung, S.P., Mok, A.K.: Advanced allergy attacks: Does a corpus really help? In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 236-255. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4637
, pp. 236-255
-
-
Chung, S.P.1
Mok, A.K.2
-
5
-
-
70449490765
-
Hmm-web: A framework for the detection of attacks against web applications
-
Corona, I., Ariu, D., Giacinto, G.: Hmm-web: a framework for the detection of attacks against web applications. In: Proc. 2009 IEEE Int'l Conf. Comm. (ICC 2009), NJ, USA, pp. 747-752 (2009)
-
(2009)
Proc. 2009 IEEE Int'l Conf. Comm. (ICC 2009), NJ, USA
, pp. 747-752
-
-
Corona, I.1
Ariu, D.2
Giacinto, G.3
-
6
-
-
12244295760
-
Adversarial classification
-
Dalvi, N., Domingos, P.: Mausam, S. Sanghai, and D. Verma. Adversarial classification. In: Proc. 10th ACM SIGKDD Int'l Conf. Knowledge Disc. and Data Mining (KDD), USA, pp. 99-108 (2004)
-
(2004)
Proc. 10th ACM SIGKDD Int'l Conf. Knowledge Disc. and Data Mining (KDD), USA
, pp. 99-108
-
-
Dalvi, N.1
Domingos, P.2
Mausam3
Sanghai, S.4
Verma, D.5
-
7
-
-
45349093205
-
A theoretical analysis of bagging as a linear combination of classifiers
-
Fumera, G., Roli, F., Serrau, A.: A theoretical analysis of bagging as a linear combination of classifiers. IEEE TPAMI 30(7), 1293-1299 (2008)
-
(2008)
IEEE TPAMI
, vol.30
, Issue.7
, pp. 1293-1299
-
-
Fumera, G.1
Roli, F.2
Serrau, A.3
-
8
-
-
33750729985
-
Outlier resistant PCA ensembles
-
Gabrys, B., Howlett, R.J., Jain, L.C. (eds.) KES 2006. Springer, Heidelberg
-
Gabrys, B., Baruque, B., Corchado, E.: Outlier resistant PCA ensembles. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds.) KES 2006. LNCS (LNAI), vol. 4253, pp. 432-440. Springer, Heidelberg (2006)
-
(2006)
LNCS (LNAI)
, vol.4253
, pp. 432-440
-
-
Gabrys, B.1
Baruque, B.2
Corchado, E.3
-
9
-
-
3543107923
-
Bagging equalizes influence
-
Grandvalet, Y.: Bagging equalizes influence. Machine Learning 55, 251-270 (2004)
-
(2004)
Machine Learning
, vol.55
, pp. 251-270
-
-
Grandvalet, Y.1
-
10
-
-
80053032828
-
Bagging in the presence of outliers
-
Scott, D. (ed.)
-
Hall, P., Turlach, B.: Bagging in the presence of outliers. In: Scott, D. (ed.) Mining and Modeling Massive Data Sets In Science, Engineering, and Business, CSS, vol. 29, pp. 536-539 (1998)
-
(1998)
Mining and Modeling Massive Data Sets in Science, Engineering, and Business, CSS
, vol.29
, pp. 536-539
-
-
Hall, P.1
Turlach, B.2
-
13
-
-
78049528115
-
Machine learning in adversarial environments
-
Laskov, P., Lippmann, R.: Machine learning in adversarial environments. Machine Learning 81, 115-119 (2010)
-
(2010)
Machine Learning
, vol.81
, pp. 115-119
-
-
Laskov, P.1
Lippmann, R.2
-
14
-
-
85084095941
-
Exploiting machine learning to subvert your spam filter
-
Nelson, B., Barreno, M., Chi, F.J., Joseph, A.D., Rubinstein, B.I.P., Saini, U., Sutton, C., Tygar, J.D., Xia, K.: Exploiting machine learning to subvert your spam filter. In: Proc. 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), CA, USA, pp. 1-9 (2008)
-
(2008)
Proc. 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), CA, USA
, pp. 1-9
-
-
Nelson, B.1
Barreno, M.2
Chi, F.J.3
Joseph, A.D.4
Rubinstein, B.I.P.5
Saini, U.6
Sutton, C.7
Tygar, J.D.8
Xia, K.9
-
15
-
-
1542634595
-
A statistical approach to the spam problem
-
Robinson, G.: A statistical approach to the spam problem. Linux J (2001), http://www.linuxjournal.com/article/6467
-
(2001)
Linux J
-
-
Robinson, G.1
-
16
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
Perdisci, R., Dagon, D., Lee, W., Fogla, P., Sharif, M.: Misleading worm signature generators using deliberate noise injection. In: Proc. 2006 IEEE Symp. Sec. and Privacy (S&P 2006), USA (2006)
-
Proc. 2006 IEEE Symp. Sec. and Privacy (S&P 2006), USA (2006)
-
-
Perdisci, R.1
Dagon, D.2
Lee, W.3
Fogla, P.4
Sharif, M.5
-
17
-
-
84877775237
-
Antidote: Understanding and defending against poisoning of anomaly detectors
-
Rubinstein, B.I., Nelson, B., Huang, L., Joseph, A.D.: Antidote: understanding and defending against poisoning of anomaly detectors. In: Proc. 9th ACM Internet Meas. Conf. IMC 2009, pp. 1-14 (2009)
-
(2009)
Proc. 9th ACM Internet Meas. Conf. IMC 2009
, pp. 1-14
-
-
Rubinstein, B.I.1
Nelson, B.2
Huang, L.3
Joseph, A.D.4
-
18
-
-
77952066514
-
Weighted bagging for graph based one-class classifiers
-
Proc. 9th Int. Workshop on MCSs. Springer, Heidelberg
-
Segui, S., Igual, L., Vitria, J.: Weighted bagging for graph based one-class classifiers. In: Proc. 9th Int. Workshop on MCSs. LNCS, vol. 5997, pp. 1-10. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5997
, pp. 1-10
-
-
Segui, S.1
Igual, L.2
Vitria, J.3
-
19
-
-
70349303511
-
Ensembles of one class support vector machines
-
Benediktsson, J.A., Kittler, J., Roli, F. (eds.) MCS 2009. Springer, Heidelberg
-
Shieh, A.D., Kamm, D.F.: Ensembles of one class support vector machines. In: Benediktsson, J.A., Kittler, J., Roli, F. (eds.) MCS 2009. LNCS, vol. 5519, pp. 181-190. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5519
, pp. 181-190
-
-
Shieh, A.D.1
Kamm, D.F.2
|